This article identifies the common root cause of several known issues related to MTOM/XOP processing in Spring-WS and discusses a possible long term solution.| Andreas Veithen's blog
This article explains the meaning of the "java.lang.IllegalStateException: Stream handler unavailable due to: null" error that you may encounter when using Apache Felix.| Andreas Veithen's blog
There are multiple ways to integrate Bootstrap with Jekyll. This article documents how I did it for my site which runs on Github pages (which means that I can't use Jekyll plugins) and only uses Bootstrap CSS.| Andreas Veithen's blog
This article explains how to load the Prism syntax highlighter asynchronously using RequireJS. The aim is to remove Prism from the critical rendering path so that it no longer blocks the initial rendering of the page. The end result should be a decrease in perceived page load time.| Andreas Veithen's blog
Learn how to run a Docker daemon remotely in Google Compute Engine and control it from your Mac OS X workstation.| Andreas Veithen's blog
Learn how to integrate Google Analytics with require.js.| Andreas Veithen's blog
This article presents some results from a recent study about Islam in Germany published by the Bertelsmann Foundation.| Andreas Veithen's blog
Learn how to avoid the pitfalls when using Google Analytics to track clicks on outbound links.| Andreas Veithen's blog
If you are using Google Analytics you may have noticed page views with referrals from ilovevitaly.com, darodar.com, priceg.com, blackhatworth.com, o-o-6-o-o.com and other suspicious domains appearing in your statistics. These are so called ghost referrals. This article describes in depth how this type of referrer spam works and debunks some common misconceptions about it. It also discusses possible solutions, include solutions that have been proposed elsewhere as well as an alternative soluti...| Andreas Veithen's blog
Abdallah Zekri: "Mahomet, Mahomet, toujours Mahomet... Il est mort il y a 15 siècles!"| Andreas Veithen's blog
Learn how to use axis2-repo-maven-plugin to properly package Axis2 modules into Web applications built using Maven.| Andreas Veithen's blog
This article describes how Maven handles unknown artifact types and what default properties it uses.| Andreas Veithen's blog
Learn how to configure supervisord such that it redirects stdout of its child processes to its own stdout.| Andreas Veithen's blog
Learn how to make the data sent to Google Analytics more consistent for pages loaded from Google's cache or displayed by Google Translate.| Andreas Veithen's blog
This article presents an elegant way to extract SOAP headers from Web service responses with the WebServiceTemplate in Spring-WS.| Andreas Veithen's blog
This article presents a complete Dockerfile that can be used to run a test instance of RHQ in a Docker container.| Andreas Veithen's blog
Learn how to create an additional HTTP or HTTPS port in WebSphere application server using the administrative console.| Andreas Veithen's blog
Learn how to use schema.org metadata to set up your Jekyll site such that Google+ can extract rich snippets from your blog posts.| Andreas Veithen's blog
This article describes how to run a full profile of WebSphere Application Server 8.x in a Docker container.| Andreas Veithen's blog
Understand how StAX works in an OSGi environment and learn which bundles you need to deploy in order to use a StAX implementation other than the one provided by the JRE.| Andreas Veithen's blog
Ein recht aktuell scheinendes Zitat aus dem Septemberprogramm des Reichskanzlers Bethmann-Hollweg von 1914.| Andreas Veithen's blog
Graphique montrant la corélation inégalités et le taux de syndicalisation aux USA.| Andreas Veithen's blog
"In those parts of the world where learning and science have prevailed, miracles have ceased; but in those parts of it as are barbarous and ignorant, miracles are still in vogue."| Andreas Veithen's blog
Learn how to use Byteman on WebSphere to detect certain data source access patterns that may result in deadlock.| Andreas Veithen's blog
This post analyzes how WebSphere and applications deployed on WebSphere react to a client reroute and what can be done to minimize the impact of a failover.| Andreas Veithen's blog
Understand why WebSphere sometimes seems to have problems reopening TCP ports after a restart and what to do about it.| Andreas Veithen's blog
Learn how to use the WebContainer MBean to temporarily suspend HTTP traffic to a WebSphere Application Server instance.| Andreas Veithen's blog
Michael Hayden, former head of the CIA: "Option three is Assad wins. And I must tell you at the moment, as ugly as it sounds, I'm kind of trending toward option three as the best out of three very, very ugly possible outcomes."| Andreas Veithen's blog
How "skeptics" view global warming.| Andreas Veithen's blog
This article gives an in-depth description how TCP backlog works in Linux and in particular what happens when the accept queue is full. Includes references to the relevant kernel sources.| Andreas Veithen's blog
Learn how to correctly parse host parameters passed on the command line or read from a configuration file such that IPv6 addresses with zone IDs are recognized.| Andreas Veithen's blog
This post describes a simple procedure to build and install a new Linux kernel on Ubuntu using the official source code from the kernel developers' Git repository. The aim is to produce a kernel that can be used as a drop-in replacement of the kernels shipped by Ubuntu and that neatly fits into the distribution.| Andreas Veithen's blog
This article presents a tool to determine the socket options for TCP sockets created by processes on Linux.| Andreas Veithen's blog
This article exposes another design flaw in WebSphere's default StAX implementation (XLXP 2).| Andreas Veithen's blog
For a given CPU, the I/O wait time is the time during which that CPU was idle (i.e. didn't execute any tasks) and there was at least one outstanding disk I/O operation requested by a task scheduled on that CPU (at the time it generated that I/O request).| Andreas Veithen's blog
This article explains how to quickly configure WebSphere with Apache Directory Server (packaged with Apache Directory Studio) for LDAP authentication.| Andreas Veithen's blog
This article describes the problems encountered while attempting to deploy the WebSphere EJB thin client in ServiceMix and how to solve them.| Andreas Veithen's blog
One of the primary tasks when designing a WebSphere topology is to decide how WebSphere instances should be grouped into cells. There is no golden rule, and this generally requires a tradeoff between multiple considerations.| Andreas Veithen's blog
This article describes how to integrate Apache ServiceMix with WebSphere's SIBus. More precisely it explores how to deploy a Camel route that sends messages to a SIBus destination in WebSphere.| Andreas Veithen's blog
Sometimes, when deleting a destination from a SIBus, the corresponding queue point is not deleted from the underlying messaging engine, but remains in state DELETE_PENDING. This article describes how to solve this problem.| Andreas Veithen's blog
This article describes a heap starvation issue on WebSphere Process Server 6.1 related to a cache used internally by SCA Web service imports.| Andreas Veithen's blog
This article describes an incident on a production systems running under Red Hat Enterprise Linux where under certain load conditions WebSphere Application Server would fail with an OutOfMemoryError with the following message: "Failed to create a thread: retVal -1073741830, errno 11".| Andreas Veithen's blog
Obama: "The United States of America is prepared to use all elements of our power, including military force, to secure our core interests in the region. We will confront external aggression against our allies and partners, as we did in the Gulf War. We will ensure the free flow of energy from the region to the world. Although America is steadily reducing our own dependence on imported oil, the world still depends on the region’s energy supply, and a severe disruption could destabilize the e...| Andreas Veithen's blog
This article exposes a design flaw in WebSphere's default StAX implementation (XLXP 2) that can be exploited to perform a denial-of-service attack.| Andreas Veithen's blog
Einige interessante Graphiken zur Korrelation zwischen Parteibindung und Einkommen/Vermögen (Deutschland).| Andreas Veithen's blog
To change the StAX implementation used in a Java EE application it should normally be enough to simply add the JAR with the third party StAX implementation (such as Woodstox) to the application. This works as expected on most application servers, except on WebSphere. In this blog post I will explain why this is so and what this tells us about the internals of WebSphere.| Andreas Veithen's blog
In the high-frequency trading business, billions of dollars are spent on high-speed lines, programming talent, and advanced computers by funds looking to capitalize on the smallest and most fleeting of mispricings. Those are computing resources and insanely intelligent people who could instead be put to work making the Internet run faster for everyone, or figuring out how to distribute electricity more efficiently, or really anything other than trying to figure out how to trade gold futures o...| Andreas Veithen's blog
"Qui est comme toi parmi les dieux, ô Yahweh? Qui est comme toi, auguste en sainteté, redoutable à la louange même, opérant des prodiges?"| Andreas Veithen's blog
Discover some of the pitfalls when using Pax Exam in a Maven build and learn how to avoid them.| Andreas Veithen's blog
Configuring virtual hosts in WebSphere is pretty straightforward, but problems may occur if there are multiple virtual host definitions that have overlapping host aliases, i.e. if the same host name/port combination is matched by multiple virtual hosts.| Andreas Veithen's blog
Fazıl Say / Omar Khayyám: "You say rivers of wine flow in heaven, is heaven a tavern to you? You say two huris await each believer there, is heaven a brothel to you?"| Andreas Veithen's blog
Understand how WebSphere configuration objects (as seen by wsadmin) relate to XML documents in the configuration repository.| Andreas Veithen's blog
Learn how to use Maven to publish releases of Github projects to Bintray.| Andreas Veithen's blog
In a previous post I discussed how the HTTP access logs on a WebSphere application server can be customized. In this post I will analyze how to do that with the access logs of a WebSphere 8.5 proxy server or on-demand router (ODR).| Andreas Veithen's blog
Learn how the HTTP access logs on a WebSphere application server can be customized.| Andreas Veithen's blog
Traduction (partielle) d'un article intitulé "Es gibt keine gemäßigten Rebellen mehr" publié par Jürgen Todenhöfer le 3 mai dans le journal allemand Frankfurter Allgemeine Zeitung.| Andreas Veithen's blog
Learn how to use styles in Visio to create complex diagrams with a consistent look.| Andreas Veithen's blog
This article describes the exceptions thrown by the WebSphere runtime for various connection related error conditions that may occur during a Web service call performed using a JAX-WS client. This information is useful in determining the root cause of a connection problem when only the exception message in the WebSphere logs is available.| Andreas Veithen's blog
In a multi-module Maven build, it is sometimes necessary to create a module that contributes content to the Maven site, but that doesn't have any content that needs to be rendered using maven-site-plugin. This article explains how to do this.| Andreas Veithen's blog
Learn how to write your wrapper scripts for supervisord or Docker such that they react correctly to SIGTERM.| Andreas Veithen's blog